Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_8cb8424d1b56552d95bc2984bc39c6b4_bkransomware.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-15_8cb8424d1b56552d95bc2984bc39c6b4_bkransomware.exe
Resource
win10v2004-20240508-en
Target
2024-05-15_8cb8424d1b56552d95bc2984bc39c6b4_bkransomware
Size
3.5MB
MD5
8cb8424d1b56552d95bc2984bc39c6b4
SHA1
b4fb0c72bce7bddaa522ee733fa32ecfdd9da21f
SHA256
39450d62400256e96d2941071c84c1cd29511e400e29651a4ffa9b0543c5eea1
SHA512
cacb9f5c04af859dfd2fd46189483c2703b8025e2e70bbf895b6b1b44ac97637040bd41963c83af17bf3f66c3b4af83b73b70282db91e761eabb5fbd5c1d8302
SSDEEP
98304:YRJdXN0B7+sNak7rMp4RL9IW1dXg3S/MHmgH:R74p46
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
InitCommonControlsEx
GlobalUnlock
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
HeapReAlloc
LoadLibraryExW
LCMapStringW
RtlUnwind
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
DeleteCriticalSection
GetFileType
GetStdHandle
GetProcessHeap
HeapSize
GetModuleHandleExW
ExitProcess
WideCharToMultiByte
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapFree
GetLastError
RaiseException
HeapAlloc
GetCommandLineW
DecodePointer
EncodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
CloseHandle
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
CreateFileW
GlobalLock
GlobalAlloc
FreeLibrary
GetProcAddress
GetModuleHandleW
MulDiv
MultiByteToWideChar
GetCurrentThreadId
GetClassNameW
SendMessageTimeoutW
AttachThreadInput
GetWindowThreadProcessId
GetWindowLongW
GetParent
SendMessageW
GetCursor
GetDesktopWindow
RedrawWindow
GetWindowDC
IsWindow
GetWindow
ChildWindowFromPointEx
ClientToScreen
EnumChildWindows
GetWindowTextW
GetDlgCtrlID
GetForegroundWindow
WindowFromPoint
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
ReleaseCapture
SendDlgItemMessageW
SetCapture
SetCursor
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
DefWindowProcW
MessageBoxW
DestroyWindow
KillTimer
PostQuitMessage
GetWindowPlacement
RegisterClassExW
LoadIconW
DispatchMessageW
TranslateMessage
IsDialogMessageW
GetMessageW
SetTimer
GetClientRect
SetWindowTextW
SetWindowPos
GetMenu
CheckMenuItem
LoadCursorW
LoadImageW
RegisterWindowMessageW
RegisterHotKey
CreateWindowExW
DestroyIcon
ReleaseDC
GetDC
GetCursorPos
IsWindowVisible
ShowWindow
EnableWindow
MoveWindow
ScreenToClient
GetWindowRect
InvalidateRect
DeleteDC
BitBlt
LineTo
MoveToEx
StretchBlt
PatBlt
CreateCompatibleBitmap
CreateCompatibleDC
Rectangle
SetROP2
GetStockObject
SelectObject
CreatePen
GetPixel
DeleteObject
CreateFontW
ChooseColorW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ